Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
☆33Oct 15, 2019Updated 6 years ago
Alternatives and similar repositories for brutekrag
Users that are interested in brutekrag are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web-based shell written in PHP☆12Aug 27, 2018Updated 7 years ago
- Simple SOCKS5 Server. Written in C.☆10Dec 27, 2019Updated 6 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.☆177Aug 16, 2024Updated last year
- Command line SIP clients based SIP SIMPLE SDK☆35Jan 15, 2021Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Automated Google dorking with custom search engines☆26May 2, 2020Updated 5 years ago
- sudo heap overflow to LPE, in Go☆16Feb 9, 2021Updated 5 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Tool to perform Brute Force Attack FTP☆11Jan 23, 2020Updated 6 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.☆13May 29, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Jun 4, 2011Updated 14 years ago
- ☆11Apr 3, 2017Updated 8 years ago
- A Simple Multi-Threaded SSH Brute Forcer☆279Apr 15, 2020Updated 5 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- Conference talk slides and code☆11Aug 6, 2020Updated 5 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- Julia package for generating random quantum states and processes according to a number of natural distributions.☆13Dec 16, 2022Updated 3 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆13Jul 23, 2025Updated 8 months ago
- Find exploitable PHP files by parameter fuzzing and function call tracing☆72Jan 24, 2017Updated 9 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- A Torrent Magnet Link Scrapper☆18Jul 31, 2020Updated 5 years ago
- Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)☆84Apr 4, 2023Updated 2 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆19Feb 14, 2020Updated 6 years ago
- A Uniswap Fork enabling ERC20 to ERC20 trades☆12Jan 24, 2023Updated 3 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- Decentralized web archiving☆20Aug 7, 2018Updated 7 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- A fork of openssh-portable for penetration testing purposes.☆11May 18, 2018Updated 7 years ago
- IPFS pining/caching donation as a service.☆62Jan 6, 2022Updated 4 years ago